Press ESC to close

RedLine, A License to Steal: The Rudometov Story & Operation Magnus

Category Details
Threat Actors RedLine Infostealer, Maxim Rudometov (developer/administrator)
Campaign Overview RedLine Infostealer emerged in 2020 as Malware-as-a-Service (MaaS). Used for credential and data theft, targeting multiple sectors including defense and cryptocurrency users. Disrupted in 2024 by Operation Magnus.
Target Regions Global (excluding CIS countries due to a built-in whitelisting mechanism). Victims included U.S. defense contractors, multinational tech companies, and cryptocurrency users.
Methodology Phishing campaigns, Telegram promotions, DarkWeb advertisements, obfuscated malware to bypass antivirus, and targeting software like Folding@Home.
Products Targeted Folding@Home, cryptocurrency wallets, saved credentials, financial data.
Malware Reference RedLine Infostealer, MysteryStealer (its predecessor).
Tools Used Telegram bot for sales, URI botnet, VkApiChecker, VkGroupParser.
Vulnerabilities Exploited No specific CVEs mentioned. Primary methods included phishing and exploiting COVID-19 chaos.
TTPs Phishing, MaaS model, cryptocurrency laundering, weak operational security (reuse of personal details across forums).
Attribution Law enforcement linked evidence from hacker forums, VKontakte accounts, email addresses, blockchain transactions, IP logs, and personal artifacts to identify Rudometov.
Recommendations Use tools like ESET’s malware checker for infections, enhance phishing awareness, monitor blockchain transactions for illicit activities, and secure sensitive environments.
Source Analyst1

Read full article: https://analyst1.com/redline-a-license-to-steal-the-rudometov-story-operation-magnus/

Disclaimer: The above summary has been generated by an AI language model

Source: Analyst1

Published on: December 5, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *